3G networks employ a hierarchical key management scheme for deriving and distributing keys among the different domains and entities. This scheme is based on the principles of storing a unique and secret 128-bit master key, called the individual subscriber authentication key (Ki), and a unique and public 128-bit identifier, known as the international mobile subscriber identity (IMSI). The Ki and the IMSI are used to generate a 128-bit session key, called the ciphering key (CK), and a 128-bit session key, called the integrity key (IK), with the help of MILENAGE or TUAK functions. Further, these CK and IK are utilized to derive a 64-bit session key, called the ciphering key for user plane (CK_U), and a 64-bit session key, referred to as the integrity key for user plane (IK_U), through an XOR operation. The CK_U and IK_U are then used to encrypt and protect data and voice traffic between the UE and RAN, using KASUMI, SNOW 3G, or AES algorithms. Additionally, CK and IK are utilized to derive another 64-bit session key, known as the ciphering key for control plane (CK_C), along with another 64-bit session key, named as the integrity key for control plane (IK_C). These CK_C and IK_C are employed to encrypt signaling messages between UE and CN using KASUMI or SNOW 3G algorithms. Moreover, CK_C and IK_C are utilized to derive yet another 64-bit session key - inter-operator key (IK_OP) - through an XOR operation. This IK_OP is used to secure signaling messages between CN and ION with KASUMI or SNOW 3G algorithms.